Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe
Resource
win10v2004-20240226-en
General
-
Target
e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe
-
Size
13.3MB
-
MD5
b655870c4585b1d0bf040fb14a919388
-
SHA1
c74ef9f2cc1b4a72535bd434e800faddcc6c8450
-
SHA256
e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31
-
SHA512
db442f385d0643a2805eed535f88a1ddee7b5353531bb9b84f9fa07172ed38c0f01e3f894a769f23fa6e4d3f4b60dce536065a6f62378b07a2d418c6072fbd88
-
SSDEEP
196608:q89duCvh7pQoXhQET1AIxGJYJbaogx2gxyfutB:Buy7p7XhN5aaHgYgxy2
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 3960 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 3960 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\font_temp.ttf e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe File opened for modification C:\Windows\Fonts\font_temp.ttf e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3120 PING.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 3960 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 3960 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3576 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 92 PID 4528 wrote to memory of 3576 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 92 PID 4528 wrote to memory of 3576 4528 e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe 92 PID 3576 wrote to memory of 3120 3576 cmd.exe 94 PID 3576 wrote to memory of 3120 3576 cmd.exe 94 PID 3576 wrote to memory of 3120 3576 cmd.exe 94 PID 3576 wrote to memory of 3960 3576 cmd.exe 95 PID 3576 wrote to memory of 3960 3576 cmd.exe 95 PID 3576 wrote to memory of 3960 3576 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe"C:\Users\Admin\AppData\Local\Temp\e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\e8dd8407f8d36f355815c69a06fc369a42d8cc5ebc88cdc9cbb3e8a2e86c2a31.exe"C:\Users\Admin\AppData\Local\Temp\E8DD84~1.EXE"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a1df3b7884c175c967505a589ba51da2
SHA17aaf570e41a00149134973d00f4efc09c4b650c2
SHA256c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525
SHA51212b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451
-
Filesize
113B
MD51db0b9922a2ba7a6326d8f192b491cba
SHA1bb085c68d55833daf5e7460c4ce26a883a48feb7
SHA256abcb618c008d7f76a14e5d46724e66a3db358ca838d4fd1763425ced612c63e2
SHA5129d57731ab84ab5122c6da759d1011f0ca4664db0baad7cdaecee30dda19c82c4aa9d6c7986821bba8eb7bae1f8171edc8787d4e819a0a88a6a21558983d094c8
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf